Migrating traditional computing systems to the Cloud seems to be gaining more popularity as some...
Securing Cloud Computing Environment: The Role of JML Process
Does your organisation have a well-implemented and effective JML process that incorporates steps for protecting your cloud computing environment?
A Joiners, Movers, and Leavers (JML) process is essential for protecting your cloud computing environment. This is especially important where you have an employee who has been terminated.
If a former employee still has access to her former employers cloud computing environment, s/he could potentially disrupt operations, steal data, or maybe even bring the house down!
Here are a few things you should do immediately to protect your cloud computing environment:
- Immediately disable the terminated employee's cloud service accounts (e.g., AWS, Azure, Google Cloud Platform)
- Revoke any API keys, access tokens, or session tokens associated with the employee.
- If using SSO, remove the employee’s access from the SSO provider to ensure they cannot access any linked services.
- Change passwords for any shared accounts that the employee had access to.
- Rotate any SSH keys, API keys, or other authentication keys the employee might have used.
This is what could happen if you don't -> Former Employee deletes servers